Lucene search

K
ibmIBMB0FDE039FBC39A6DD867656CFE2D35E7CDE69FF01EBF48EFE7AD5DE56568A5E4
HistoryJun 18, 2018 - 1:28 a.m.

Security Bulletin: PowerKVM is affected by two Qemu vulnerabilities

2018-06-1801:28:53
www.ibm.com
12

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

Summary

PowerKVM is affected by two Qemu vulnerabilities.

Vulnerability Details

CVEID: CVE-2015-3214**
DESCRIPTION:** QEMU could allow a local attacker to execute arbitrary code on the system, caused by an out-of-bounds memory access in the pit_ioport_read function. If QEMU PIT emulation is enabled, an attacker could exploit this vulnerability to corrupt memory and execute arbitrary code on the system or obtain sensitive information.
CVSS Base Score: 4.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/103911 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVEID: CVE-2015-4037**
DESCRIPTION:** QEMU is vulnerable to a denial of service, caused by insecure temporary file use in /net/slirp.c. An attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 4.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/103526 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C)

Affected Products and Versions

PowerKVM 2.1

Remediation/Fixes

Fix is made available via Fix Central (https://ibm.biz/BdEnT8) in 2.1.1 build 58 and all later builds and fix packs. For systems currently running fix levels of PowerKVM prior to 2.1.1, please see <http://download4.boulder.ibm.com/sar/CMA/OSA/05e4c/0/README&gt; for prerequisite fixes and instructions. Customers can also update from 2.1.1 (GA and later levels) by using “yum update”.

Workarounds and Mitigations

None

CPENameOperatorVersion
powerkvmeq2.1

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C